The not-so-definitive guide to cybersecurity and data privacy laws

Credit to Author: davidruiz| Date: Thu, 07 Mar 2019 16:00:00 +0000

In the first blog for Malwarebytes Labs’ cybersecurity and data privacy law series, we tackle US data privacy compliance from a startup’s perspective. GDPR, COPPA, HIPAA—it’s all here.

Categories:

Tags:

(Read more…)

The post The not-so-definitive guide to cybersecurity and data privacy laws appeared first on Malwarebytes Labs.

Read more

This Week in Security News: Instagram Hackers and Enterprise Threats

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 01 Mar 2019 14:57:50 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how a group of hackers is stealing popular Instagram profiles. Also, learn about old and new cybersecurity issues inundated enterprises in 2018. Read on: Insecure VPNs:…

The post This Week in Security News: Instagram Hackers and Enterprise Threats appeared first on .

Read more

Recommendations for deploying the latest Attack surface reduction rules for maximum impact

Credit to Author: Windows Defender ATP team| Date: Fri, 22 Feb 2019 22:10:22 +0000

The keystone to good security hygiene is limiting your attack surface. Attack surface reduction is a technique to remove or constrain exploitable behaviors in your systems. In this blog, we discuss the two attack surface reduction rules introduced in the most recent release of Windows and cover suggested deployment methods and best practices. Software applications

Read more

The post Recommendations for deploying the latest Attack surface reduction rules for maximum impact appeared first on Microsoft Secure.

Read more

Lessons learned from the Microsoft SOC—Part 1: Organization

Credit to Author: Mark Simos, Kristina Laidler and John Dellinger| Date: Thu, 21 Feb 2019 19:00:17 +0000

In the first of our three part series, we provide tips on how to manage a security operations center (SOC) to be more responsive, effective, and collaborative.

The post Lessons learned from the Microsoft SOC—Part 1: Organization appeared first on Microsoft Secure.

Read more

The lazy person’s guide to cybersecurity: minimum effort for maximum protection

Credit to Author: Pieter Arntz| Date: Thu, 21 Feb 2019 17:00:00 +0000

How can we help our less tech-savvy friends stay more secure online? By giving them a lazy person’s guide to cybersecurity, we can offer maximum protection for minimal effort.

Categories:

Tags:

(Read more…)

The post The lazy person’s guide to cybersecurity: minimum effort for maximum protection appeared first on Malwarebytes Labs.

Read more

Why the Pipeline Cybersecurity Initiative is a critical step

Credit to Author: Joram Borenstein| Date: Thu, 21 Feb 2019 17:00:54 +0000

Working together with government to push a more coordinated effort around infrastructure securityparticularly pipelines and utilitiesis critical. The new Pipeline Cybersecurity Initiative will help ensure that additional resources, information-sharing, and coordination will help mitigate additional cyber-related risks against the U.S. energy industry in the coming years.

The post Why the Pipeline Cybersecurity Initiative is a critical step appeared first on Microsoft Secure.

Read more

Step 5. Set up mobile device management: top 10 actions to secure your environment

Credit to Author: Debbie Seres| Date: Thu, 14 Feb 2019 17:00:35 +0000

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 5. Set up mobile device management, youll learn how to plan your Microsoft Intune deployment and set up Mobile Device Management (MDM) as part of your Unified Endpoint Management (UEM) strategy.

The post Step 5. Set up mobile device management: top 10 actions to secure your environment appeared first on Microsoft Secure.

Read more

A week in security (February 4 – 8)

Credit to Author: Malwarebytes Labs| Date: Mon, 11 Feb 2019 17:05:33 +0000

A roundup of security news from February 4 – 8, including Facebook’s secure messaging integration, Google’s changes to URLs, a scam involving the Kindle store and John Wick, and more.

Categories:

Tags:

(Read more…)

The post A week in security (February 4 – 8) appeared first on Malwarebytes Labs.

Read more